Known plaintext - XOR

20 Points  

For this challenge you will need to decypher a simple XORed picture.

Author

Ryscrow,  

Level  Difficulty

Validations

4144 Challengers 4%

Note  Notation

193 Votes
To reach this part of the site please login

Challenge Results Challenge Results

Pseudo Challenge Lang date
Riyansh   Known plaintext - XOR en 18 June 2019 at 07:16
CalvlnKleln95   Clair connu - XOR fr 17 June 2019 at 22:25
harry41   Clair connu - XOR fr 17 June 2019 at 21:34
Irvin Pango   Clair connu - XOR fr 16 June 2019 at 12:20
superorakul   Known plaintext - XOR en 15 June 2019 at 20:52
5py93r   Known plaintext - XOR en 15 June 2019 at 19:57
CSY54   Known plaintext - XOR en 15 June 2019 at 16:31
EquinoXx   Clair connu - XOR fr 15 June 2019 at 16:19
pradhyumn dvivedi   Known plaintext - XOR en 15 June 2019 at 14:30
Rishabh jain   Known plaintext - XOR en 15 June 2019 at 09:57

Challenges associated with this section 44 Challenges

Results Challenge's Name Validations Number of points  Explanation for the scores Difficulty  Difficulty Author Note  Notation Solution
pas_valide Encoding - ASCII 26% 35057 5 Xartrick 10
pas_valide Encoding - UU 21% 27820 5 g0uZ 10
pas_valide Hash - Message Digest 5 21% 28564 5 g0uZ 6
pas_valide Hash - SHA-2 11% 14211 5 koma 3
pas_valide Shift cipher 7% 8414 10 m31z0nyx 5
pas_valide Pixel Madness 5% 6779 15 Ryscrow 10
pas_valide ELF64 - PID encryption 3% 3937 15 Lu33Y 10
pas_valide File - PKZIP 4% 5029 15 g0uZ 5
pas_valide Monoalphabetic substitution - Caesar 5% 6598 15 Arod 4
pas_valide Known plaintext - XOR 4% 4143 20 Ryscrow 4
pas_valide Code - Pseudo Random Number Generator 2% 1563 20 Tosh 5
pas_valide File - Insecure storage 1 4% 4674 20 g0uZ 5
pas_valide Polyalphabetic substitution - Vigenère 4% 4486 20 Arod 3
pas_valide System - Android lock pattern 3% 2864 20 Silentd 3
pas_valide Transposition - Rail Fence 2% 2693 20 YellowS4 2
pas_valide AES - CBC - Bit-Flipping Attack 1% 235 25 Tie21 1
pas_valide AES - ECB 1% 1130 25 cez40 4
pas_valide LFSR - Known plaintext 1% 198 25 Brissouille 1
pas_valide RSA - Factorisation 2% 1885 25 HacKSpider 4
pas_valide RSA - Decipher Oracle 1% 486 25 Zweisamkeit 3
pas_valide Service - Timing attack 2% 1384 25 g0uZ, koma 3
pas_valide Monoalphabetic substitution - Polybe 2% 1560 25 koma 6
pas_valide Initialisation Vector 1% 829 25 manticore, notfound 3
pas_valide GEDEFU 1% 267 30 makhno 1
pas_valide RSA - Corrupted key V1 1% 107 30 blackndoor 2
pas_valide RSA - Continued fractions 1% 644 30 sambecks 1
pas_valide RSA - Common modulus 1% 579 30 franb 2
pas_valide Service - Hash length extension attack 1% 369 30 koma 1
pas_valide AES - 4 Rounds 1% 75 35 Cryptanalyse 0
pas_valide RSA - Padding 1% 115 35 Tosh 0
pas_valide AES128 - CTR 1% 361 40 Tosh 1
pas_valide Discrete logarithm problem 1% 478 40 Thanat0s, RFC4949 3
pas_valide RSA - Corrupted key V2 1% 86 40 blackndoor 0
pas_valide RSA - Multiple recipients 1% 545 40 franb 3
pas_valide AES - Fault attack #1 1% 38 50 Cryptanalyse 1
pas_valide Enigma Machine 1% 97 50 peyman 1
pas_valide ECDHE 1% 103 60 Tosh 2
pas_valide Service - CBC Padding 1% 577 60 koma 1
pas_valide Polyalphabetic substitution - One Time Pad 1% 246 60 Thanat0s 0
pas_valide White-Box Cryptography 1% 63 60 Cryptanalyse 2
pas_valide AES - Weaker variant 1% 27 70 Cryptanalyse 0
pas_valide Hash - SHA-3 1% 56 75 Revenger 1
pas_valide AES - Fault attack #2 1% 26 80 Cryptanalyse 0
pas_valide AES-PMAC 1% 4 100 Cryptanalyse 0